Sciweavers

31 search results - page 4 / 7
» Relational transducers for declarative networking
Sort
View
HICSS
2005
IEEE
142views Biometrics» more  HICSS 2005»
14 years 2 months ago
Understand Corporate Rationales for Engaging in Reverse Stock Splits - A Data Mining Application
There has been much written on the individual topics of bankruptcy prediction, corporate performance, and reverse stock splits. However, there is little research into the relation...
Melody Y. Kiang, Dorothy M. Fisher, Steve A. Fishe...
ICASSP
2011
IEEE
13 years 7 days ago
Speech inversion: Benefits of tract variables over pellet trajectories
Speech inversion is a way of estimating articulatory trajectories or vocal tract configurations from the acoustic speech signal. Traditionally, articulator flesh-point or pellet t...
Vikramjit Mitra, Hosung Nam, Carol Y. Espy-Wilson,...
POLICY
2001
Springer
14 years 29 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ENTCS
2007
190views more  ENTCS 2007»
13 years 8 months ago
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
We suggest a formal model to represent and solve the multicast routing problem in multicast networks. To attain this, we model the network adapting it to a weighted and-or graph, ...
Stefano Bistarelli, Ugo Montanari, Francesca Rossi...
MOBISYS
2003
ACM
14 years 8 months ago
Tactics-Based Remote Execution for Mobile Computing
Remote execution can transform the puniest mobile device into a computing giant able to run resource-intensive applications such as natural language translation, speech recognitio...
Rajesh Krishna Balan, Mahadev Satyanarayanan, SoYo...